Browse the articles below for additional topics, tutorials, and reference guides, or search this guide using the search bar to the right. You can view all articles included in this guide by selecting Articles from the menu above.

This tutorial explains how to add storage in the following ways:
Add a new storage server to an existing destination
Add a store point
Add a provider as a destination
For full information on storage and data balancing, please see Destinations reference.

There are three different ways to add users to your Code42 environment via the administration console. This article covers each option and provides step-by-step instructions for adding users by:
Entering information manually for each user
Uploading a text file with a list of users
Sending email invitations
For information about authenticating users with LDAP, please see Integrating With LDAP For User Authentication.

This tutorial explains how to configure your Code42 environment to support the use of RADIUS and LDAP together. Under this configuration, RADIUS is used for authentication, while LDAP handles other aspects of user management, such as user deactivation, role assignment, and organization assignment.

This tutorial explains how to convert your Code42 environment from using exclusively local destinations (i.e., destinations using enterprise servers and store points in your own datacenter) to exclusively using cloud destinations provided by Code42 or a third party.

Your Code42 environment sends email notifications for many types of events. By default, these emails follow standardized templates stored on your master server. You can create custom versions of these templates to customize the emails that your Code42 environment sends to your administrators and end users.

As the number of users and devices in your Code42 environment increases, the amount of Java Virtual Machine (JVM) heap space memory consumed on your enterprise server(s) will also increase. If your enterprise server runs out of heap space, it will be necessary to increase the maximum heap space setting. This tutorial explains how to increase the amount of memory allocated to your Code42 environment's JVM heap space.

The enterprise server includes self-signed SSL certificates that can be used for secure access to the administration console. While this approach is secure, accessing these applications with a web browser can result in security warnings.
To eliminate browser security warnings when accessing the administration console via HTTPS, you can install a certificate signed by a recognized certificate authority (CA). This is very similar to the process of installing an SSL certificate for a standard web server.
The instructions in this article explain the details for obtaining and installing a CA-signed certificate into your enterprise server in several situations:
You have a private key and CA-signed certificate and your enterprise server runs on Mac, Linux or Solaris.
You have a private key and CA-signed certificate and your enterprise server run on Windows.
You do not have a private key or certificate.

If you have a large amount of information to back up (at least 100 GB), completing an initial backup online could take many weeks. Code42's Seeded Backup service can help you complete your initial backup much more quickly.

RADIUS is a networking protocol that provides authentication, authorization and accounting. This tutorial explains how to configure your Code42 environment to authenticate with one or more RADIUS servers.

This tutorial explains how to integrate your Code42 environment to work with Okta, an identity management provider. Okta provides centralized user access control using Single Sign-On (SSO) technologies such as SAML and supports integration with an existing directory service, such as Google Apps or Active Directory.
This tutorial uses Okta's customized application for CrashPlan PROe, which simplifies the integration and setup process. For greater control over integrating your Code42 environment with Okta, please see our general Okta integration article.

This tutorial explains how to integrate your Code42 environment to work with the Okta identity management provider. Okta provides a standards-based service to enable centralized user access control using Single Sign-On (SSO) technologies such as SAML. Okta's cloud-based SSO service also supports integration with an existing directory service, such as Google Apps or Active Directory.

The PROe Cloud is a fast, simple way to start backing up with CrashPlan PROe. PROe Cloud customers can access their administration console, set up new devices, and start backing up immediately using this guide.

This tutorial explains how to configure the CrashPlan PROe Cloud Destination in a hybrid deployment and make it an available backup destination for users.
Follow these instructions using the network and provider key information you received from your PRO Services engineer.

This tutorial explains how to integrate your Code42 environment to work with Ping Identity (also known as Ping One). Ping Identity provides a standards-based service to enable centralized user access control using Single Sign-On (SSO) technologies such as SAML and OpenID. Ping Identity's cloud-based SSO service also supports the use of an identity bridge to link to an existing directory service, such as Google Apps or Active Directory.

Backup sets are an option in CrashPlan PROe that can configure different groups of files to back up to different locations with different settings. For example, you can configure devices in your Code42 environment to back up frequently changed documents with a high priority each day, but also to back up relatively static system files with a lower priority only once a week.

You can customize the administration console by adding your own graphics and text. The information in this article outlines what specific elements can be customized and how to enable the customizations. Only the elements described in this article are customizable.

A destination is a logical grouping of enterprise servers and storage servers within a single LAN or a single data center. Devices back up to destinations. For best data protection we always recommend backing up your devices to at least two destinations.

The Backup tab under Settings > Device allows you to control how and when backup operations take place, what files to include and exclude from backup, the frequency of backup and how long versions should be retained. Advanced settings allow you to control backup processes like real-time file watching, data de-duplication, encryption and compression.

Use the Security command on the Settings > Devices menu to set the default encryption key policy for all users (new and existing). After the encryption policy is upgraded, upgraded users can never downgrade their policy.
Considerations
NOTE: Changing your account password or private password does not require that you restart your backup.
IMPORTANT: Changing your data key requires that you restart your backup.

Organizations are the Code42 environment's way of grouping users. You can configure different organizations to use different settings, different backup destinations or even use different LDAP servers to authenticate users.

The Settings > Organizations options specify the default organization settings (storage quotas, destinations, reporting, and security) for any new organizations you create. These top-level settings also affect settings for organizations that are configured to inherit the top-level settings.